08 Jul 2016

Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites

“When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the traffic is coming from or going to, the final hop in the network (known as an exit node) gets to know

Read More
07 Jul 2016

Darpa Goes Full Tron With Its Grand Battle of the Hack Bots

“All this is dress rehearsal for a $55 million hacking contest put on by Darpa, the visionary research wing of the US Defense Department. The contest is called the Cyber Grand Challenge, and it’s set for early August. Seven teams will compete inside seven supercomputers erected in a ballroom at

Read More
07 Jul 2016

Criminals winning ‘cyber arms race’

“Businesses and law enforcement agencies are losing the ‘cyber arms race’ with online criminals, the UK’s National Crime Agency has warned.” Source: Criminals winning ‘cyber arms race’ – National Crime Agency – BBC News

Read More
07 Jul 2016

Cyber attacks to surge at Olympics, Israeli security firm warns

“Studying previous sporting events through its intelligence analysis platform, Tel Aviv-based Cytegic, a cybersecurity company, has identified a surge of cyber activity ahead of and during major global sporting events. This same activity is expected to surge in the weeks ahead of and during the Olympics in Brazil in August

Read More
06 Jul 2016

10 million Android devices reportedly infected with Chinese malware

“At least 10 million Android devices have been infected by malware called HummingBad, according to cybersecurity software maker Check Point.” Source: 10 million Android devices reportedly infected with Chinese malware – CNET

Read More
05 Jul 2016

Why the Modern-Day Government Should Focus More on Big Data Curation

“Data management is not a new concept in government IT, nor is the discussion about how to improve IT and business engagement through better use of data. Government agencies always have recognized the importance of leveraging their data. However, today’s government data users (usually referred to in IT circles as

Read More
05 Jul 2016

Hackers Leak Muslim Dating Site Messages, Command Zombie Security Cameras to Crash Sites Worldwide and Hit up Vegas Hard Rock

“A hacker grabbed a horde of credentials and profiles from the specialty dating site and posted the data online, along with more than half a million private messages between users.” Source: Hackers Leak Muslim Dating Site Messages, Command Zombie Security Cameras to Crash Sites Worldwide and Hit up Vegas Hard

Read More
03 Jul 2016

The Secret Startup That Saved the Worst Website in America

“The spectacular failure of Healthcare.gov at launch led to the creation of what came to be known as the Tech Surge, a group of Silicon Valley developers who rescued the website from disorganized contractors and bureaucratic mismanagement. That group gave rise to the U.S. Digital Service and, to a lesser

Read More
01 Jul 2016

Hackers investing 40% of crime proceeds in new criminal techniques

“Cyber-criminals are investing up to 40 percent of their stolen funds in improving and modernising their techniques and criminal schemes according to a recent report issued by cyber-experts at the Russian Ministry of Communications.” Source: Hackers investing 40% of crime proceeds in new criminal techniques

Read More
01 Jul 2016

This is South Korea’s elite cyber army that fights North Korea

“The Korean War may have officially lasted from 1950 to 1953, but in reality it never quite ended. It began when North Korea invaded South Korea, and after many air and land skirmishes, the fighting ceased on July 27, 1953, when an armistice was signed. However, no peace treaty exists

Read More